{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T12:45:39Z","timestamp":1763037939287,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819970315"},{"type":"electronic","value":"9789819970322"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-7032-2_24","type":"book-chapter","created":{"date-parts":[[2023,11,7]],"date-time":"2023-11-07T23:02:49Z","timestamp":1699398169000},"page":"399-418","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["LocKey: Location-Based Key Extraction from\u00a0the\u00a0WiFi Environment in\u00a0the\u00a0User\u2019s Vicinity"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6216-6100","authenticated-orcid":false,"given":"Philipp","family":"Jakubeit","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2929-5001","authenticated-orcid":false,"given":"Andreas","family":"Peter","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5113-2746","authenticated-orcid":false,"given":"Maarten","family":"van Steen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,8]]},"reference":[{"key":"24_CR1","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.cose.2013.05.004","volume":"39","author":"I Agudo","year":"2013","unstructured":"Agudo, I., Rios, R., Lopez, J.: A privacy-aware continuous authentication scheme for proximity-based access control. Comput. Secur. 39, 117\u2013126 (2013)","journal-title":"Comput. Secur."},{"issue":"2","key":"24_CR2","doi-asserted-by":"publisher","first-page":"3335","DOI":"10.1109\/JIOT.2018.2882610","volume":"6","author":"MN Aman","year":"2018","unstructured":"Aman, M.N., Basheer, M.H., Sikdar, B.: Two-factor authentication for IoT with location information. IEEE Internet Things J. 6(2), 3335\u20133351 (2018)","journal-title":"IEEE Internet Things J."},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Azimi-Sadjadi, B., Kiayias, A., Mercado, A., Yener, B.: Robust key generation from signal envelopes in wireless networks. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 401\u2013410 (2007)","DOI":"10.1145\/1315245.1315295"},{"key":"24_CR4","unstructured":"Barker, E., Dang, Q.: Nist special publication 800\u201357 part 1, revision 5: Recommendation for key management: Part 1-general, May 2020. Cited on, page 58 (2020)"},{"key":"24_CR5","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The keccak sponge function family: Specifications summary (2011). http:\/\/keccak.noekeon.org\/specs_summary.html"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Carter, J.L., Wegman, M.N.: Universal classes of hash functions. In: Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, pp. 106\u2013112 (1977)","DOI":"10.1145\/800105.803400"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-642-03356-8_23","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"N Chandran","year":"2009","unstructured":"Chandran, N., Goyal, V., Moriarty, R., Ostrovsky, R.: Position based cryptography. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 391\u2013407. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03356-8_23"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Cho, Y., Bao, L., Goodrich, M.T.: LAAC: a location-aware access control protocol. In: 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems-Workshops, pp. 1\u20137 (2006)","DOI":"10.1109\/MOBIQW.2006.361757"},{"key":"24_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523\u2013540. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_31"},{"key":"#cr-split#-24_CR10.1","unstructured":"Fakhreddine, A., Tippenhauer, N.O., Giustiniano, D.: Design and large-scale evaluation of WiFi proximity metrics. In: European Wireless 2018"},{"key":"#cr-split#-24_CR10.2","unstructured":"24th European Wireless Conference, pp. 1-6. VDE (2018)"},{"key":"24_CR11","unstructured":"Foti, J.: Entity authentication using public key cryptography (1997)"},{"key":"24_CR12","unstructured":"GNOME. org.freedesktop.networkmanager.accesspoint (2021). https:\/\/developer.gnome.org\/NetworkManager\/1.2\/gdbus-org.freedesktop.NetworkManager.AccessPoint.html"},{"key":"24_CR13","unstructured":"Hocquenghem, A.: Codes correcteurs d\u2019erreurs. Chiffers 2, 147\u2013156 (1959)"},{"key":"24_CR14","unstructured":"IEEE Standard. Wireless lan medium access control (mac)and physical layer (phy) specifications (2007). https:\/\/www.iith.ac.in\/~tbr\/teaching\/docs\/802.11-2007.pdf"},{"key":"24_CR15","unstructured":"Intel. Dual band wireless-ac 8265 (2021). https:\/\/ark.intel.com\/content\/www\/us\/en\/ark\/products\/94150\/intel-dual-band-wireless-ac-8265.html"},{"key":"24_CR16","unstructured":"ISO 27000. Information technology, security techniques, information security management systems, overview andvocabulary (2018)"},{"issue":"6","key":"24_CR17","first-page":"16","volume":"2","author":"A Jagadeesan","year":"2010","unstructured":"Jagadeesan, A., Thillaikkarasi, T., Duraiswamy, K.: Cryptographic key generation from multiple biometric modalities: fusing minutiae with iris feature. Int. J. Comput. Appl. 2(6), 16\u201326 (2010)","journal-title":"Int. J. Comput. Appl."},{"key":"24_CR18","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-031-25467-3_4","volume-title":"Emerging Technologies for Authorization and Authentication","author":"P Jakubeit","year":"2022","unstructured":"Jakubeit, P., Peter, A., van Steen, M.: The measurable environment as nonintrusive authentication factor on the example of WiFi beacon frames. In: Saracino, A., Mori, P. (eds.) ETAA 2022. LNCS, vol. 13782, pp. 48\u201369. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-25467-3_4"},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Jeong, W., et al.: SDR receiver using commodity wifi via physical-layer signal reconstruction. In: Proceedings of the 26th Annual International Conference on Mobile Computing and Networking, pp. 1\u201314 (2020)","DOI":"10.1145\/3372224.3419189"},{"issue":"2","key":"24_CR20","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A Juels","year":"2006","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Crypt. 38(2), 237\u2013257 (2006)","journal-title":"Des. Codes Crypt."},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Li, G., Bours, P.: Studying WiFi and accelerometer data based authentication method on mobile phones. In: Proceedings of the 2018 2nd international Conference on Biometric Engineering and Applications, pp. 18\u201323 (2018)","DOI":"10.1145\/3230820.3230824"},{"key":"24_CR22","unstructured":"Lohr, C.: A WebGL-based raytraced voxel engine with transparency of WiFi signal over a 360mm x 360mm x 180mm area (2016). https:\/\/cnlohr.github.io\/voxeltastic\/"},{"key":"24_CR23","unstructured":"Turner, J.M.: The keyed-hash message authentication code (HMAC). Federal Inf. Process. Standards Publ. 198(1), 1\u201313 (2008)"},{"key":"24_CR24","unstructured":"WP29. Opinion 01\/2017 on the proposed regulation for the eprivacy regulation (2002\/58\/ec). (2017). http:\/\/ec.europa.eu\/newsroom\/document.cfm?doc_id=44103"},{"issue":"6","key":"24_CR25","doi-asserted-by":"publisher","first-page":"912873","DOI":"10.1155\/2013\/912873","volume":"9","author":"W Yang","year":"2013","unstructured":"Yang, W., Sun, Y., Zhan, L., Ji, Y.: Low mismatch key agreement based on wavelet-transform trend and fuzzy vault in body area network. Int. J. Distrib. Sens. Netw. 9(6), 912873 (2013)","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"3","key":"24_CR26","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/MCOM.2015.7060497","volume":"53","author":"C Yang","year":"2015","unstructured":"Yang, C., Shao, H.-R.: WiFi-based indoor positioning. IEEE Commun. Mag. 53(3), 150\u2013157 (2015)","journal-title":"IEEE Commun. Mag."}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-7032-2_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,7]],"date-time":"2023-11-07T23:05:36Z","timestamp":1699398336000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-7032-2_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819970315","9789819970322"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-7032-2_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"8 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"80","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}